In Democratic Individuality, I argued that at a high level of abstraction, modern conservatives, liberals and radicals believe that the best economic, social and political institutions foster each person’s individuality. Their differences are largely empirical or social theoretical. All clash with modern authoritarians. I will take up practical issues such as torture and the lineage of the neocons and link them to larger issues in how we conceive a decent regime, locally and internationally.

About Me

I am John Evans professor at the Josef Korbel School of International Studies at the University of Denver and author of Marx's Politics:Communists and Citizens (Rutgers, 1980), Democratic Individuality (Cambridge, 1990), Must Global Politics Constrain Democracy (1999) and Black Patriots and Loyalists: Fighting for Emancipation in the War for Independence (Chicago March, 2012).

When: 4:00 PM-7 PM November 15, 2016

Host Contact Info: micah@350colorado.org

The movement to stop the Dakota Access Pipeline is growing stronger by the day, and it’s time for all of us to rise up and play a role in this fight.

Join us on Tuesday, November 15 for a solidarity action and rally at DU, where pipeline companies such as Transcanada, Enbridge and Michels (DAPL funders) are convening for a 2-day "Pipeline Leadership Conference". Students and non-students will make sure they know that they are not welcome and will call on the Obama Administration and the Corps of Engineers to revoke the permits for this dirty oil pipeline.

The Army Corps fast-tracked the Dakota Access Pipeline without proper consultation, and as a result, bulldozers are approaching Standing Rock as we speak. But with coordinated, massive demonstrations across the country, we’ll make it clear that this powerful movement will not allow the Obama administration or the incoming President to sacrifice Indigenous rights, our water, or our climate - they must reject this pipeline.

This day of action is one of many calls for solidarity actions targeting not only the Army Corps, but stakeholders at every level -- including the banks who are funding Dakota Access and the companies building the project.

Please bring a candle, art and posters/banners -- and be sure to share on social media with #NoDAPL. Here's the FB event page link: https://www.facebook.com/events/336430943396264/

Some sample messages for art include:

People over Pipelines

#NoDAPL

In Solidarity with Standing Rock

Obama: Stop the Dakota Access Pipeline

Participating organizations: Native Student Alliance, Black Student Alliance, Divest DU, Sustainable International Development Initiatives, Multicultural Social Justice, Latino Student Alliance, unaffiliated students, Four Winds American Indian Council, American Indian Movement of Colorado, 350 Colorado, Earth Guardians, Greenpeace, Permaculture Action Network, Center for Biological Diversity, Food & Water Watch and many other national partners (Please email micah@350colorado.org if your group would like to join in!)

Saturday, November 5, 2016

The Greater Park Hill Community News, edited by Cara Degette, has published since 1961. Park Hill, a vibrant and pretty integrated community, is one where I lived for a long time. 2 longer articles of mine, emphasizing the importance of sacred stones and sacred land, appeared in the Daily Beast here and in Who.What.Whyhere.

***

FIRSTHAND ACCOUNT AT STANDING ROCK

On April 1, some 70 men and women from the Standing Rock Indian Reservation, which straddles North and South Dakota, erected an encampment on private land owned by LaDonna Brave Bull Allard. They were there, on what they hold to be sacred land, to protest the poisoning of their water – water that they hold to be equally sacred.

Without consulting the Sioux tribes, a conglomerate oil company in Texas—Energy Transfer Partners—had gotten permission from the U.S. Army Corps of Engineers to construct the $3.8 billion Dakota Access Pipeline (DAP), an oil pipeline that would run near the reservation and beneath the Missouri River, the reservation’s sole source of water.

The Dakota and Lakota tribes have long lived in this territory. Here, led by Sitting Bull and Red Cloud, they fought off the U.S. Army and were defeated after long battles. Here, on Sept. 3, 1863, the army committed the Whitestone Massacre of 300 men, women, and children. The tribes still hold treaty rights to this land. Their ancestors are buried here.

But the Lakota were not consulted by the Army Corps of Engineers, either about their gravesites nor the waters, in the most recent plan to build an oil pipeline.

The pipeline was originally supposed to go above Bismarck, in territory mainly inhabited by whites. But the company shifted it to go south through Standing Rock, crossing under Lake Oahe (part of the Missouri River) and the Missouri twice.

The Sacred Land encampment is a vibrant, spiritual place. It had grown into a second camp of some 2,000 people on nearby public land by the time we arrived on Aug. 30. Over the weekend, the numbers swelled. According to news reports, some 3,000 to 4,000 protesters were encamped at the site.

Since April, word about protecting the waters has spread, and many indigenous peoples have sent support. As you enter Red Warrior camp, the flags of 154 tribes flutter along both sides of the road. People come locally and from as far away as Manitoba, Sasketchwan, California, Oklahoma, and Minnesota.

Here, water does not just give life. Water is an extension of the people. Mni Wiconi is the Lakota phrase: “Water is life.”

We spent five days with the land protectors (they do not call themselves protesters, but protectors or defenders). We listened to drumming and prayer songs, sometimes late into the night. We met three Cheyenne and Arapaho women who had just driven 15 hours from Oklahoma, and a man from Minnesota who had been at Standing Rock for a week, gone away, and had just returned.

We heard a Minnesota woman who lived near Lake Superior speak about how when she was growing up, you could catch and eat a fish every day. One day, her grandfather warned that there would be a fight over the purity of the water. This had seemed unimaginable to her, the water blue or gray, shifting with sun or clouds.

Now, the waters are murkier, and a pregnant woman may eat only one fish caught in the lake in nine months.

The Lakota is also a women’s culture, so there were two large circle prayer meetings of women while we were there. One went down to the river. The other lifted its voice to the pure waters in the sky. Women sought the maintenance of the Missouri and Lake Oahe for children, grandchildren, and seven generations to come.

In April, young Lakotas said they would not acquiesce to oil pipes under the water. At one evening gathering, a Pawnee counselor who had worked for 12 years to prevent teenage suicides told of the vibrancy and initiative of the runners who spoke to Congress about the DAP.

When the Lakota people pray and sing, they speak naturally of the earth, the mother. The water and the land are given by grandfather spirit—tunkashila in Lakota—to make the life of all tribes, animals, and humans good. Tim Mentz, an elder, spoke of the understandings and instructions, passed through the grandmothers, of 19 generations. And Dave Archambault, Standing Rock Sioux tribal chairman, said that the prayers, which began in April, had yielded guidance, as the elders conjured a vision of a nonviolent resistance movement to protect the water.

Despite dispossession from the lands, the ethnic cleansing, the treaties broken by the U.S. government, and the associated trans-generational trauma, the people at the encampment display an immediate, rich sense of the continuity of their ancestors and the sacredness of the earth.

As 13-year-old Anna Lee Rain Yellowhammer put it in a petition: “Oil companies keep telling us that this is perfectly safe, but we’ve learned that that’s a lie: from 2012-2013 alone, there were 300 oil pipeline breaks in the state of North Dakota. With such a high chance that this pipeline will leak, I can only guess that the oil industry keeps pushing for it because they don’t care about our health and safety. It’s like they think our lives are more expendable than others.”

A substantial leak would poison the waters all the way down to where the Missouri flows into the Mississippi, all the way down to Mexico.

Many of us drink the Missouri’s water, and most of the country eats the crops grown in the region. This pipeline threatens every American.

Editor’s Note: Alan Gilbert is a Distinguished Professor of International Studies at the University of Denver. Paula Bard is a fine-art photographer. They traveled to the Sacred Stone encampment in North Dakota, where efforts are underway to save the waters of the Missouri and sacred gravesites from destruction by the Dakota Access Pipeline. A version of this account first appeared in the online magazine Who.What.Why. In late October, more than 100 protectors were arrested at a peaceful march after they were confronted by police in riot gear. Hundreds of defenders are getting ready to settle in for the winter.

our elections has become
dependent on machines that sometimes leave no paper trail. Manufacturers
have “proprietary” programs and will not let any public officials or
independent experts examine them.

On a cold winter day in 2007,
Andrew Appel, a Princeton computer professor and election specialist, changed
the outcome on one of these machines in seven minutes. He proved something that
should alarm everyone: in effect, it took seven minutes per machine to steal an
election.

In testimony to a House of
Representatives Technology Committee on September 28, 2016, which is now
suddenly paying attention because of the fear of “Russian” hacking,

Appel noted:

“Installing new software in a
voting machine is not really much different from installing new software in any
other kind of computer. Installing new software is how you hack a voting
machine to cheat. In 2009, in the courtroom of the Superior

century ago, because they
promised speed and convenience. They can tally results more quickly than a more
reliable and re-checkable hand count.

From the beginning, there were
ways to corrupt non-computerized machines, Appel said. One such ploy was the
“pencil shaving trick.” Putting shavings on the lever of an opposition party
would choke off counting ballots until the shavings came loose and fell free.

While this left a tell-tale
discrepancy between the counted results and the number of voters who signed in
at that polling place to vote, the scam worked if no one checked.

Latest Computers Easier to

Hack

.

You might think the advent of
computerized voting machines, starting around 2002, would have made it harder
to corrupt

vote counting. In fact, even the
latest generation of such machines are much easier to hack without leaving a
trace.

These machines are big
money-makers for private

corporations, which lobbied
legislators about their

supposed advantages. But they also
pose a serious threat

to the integrity of our
elections.

DRE Direct-Recording Electronic
or “touchscreen” voting machines that leave no paper trail will be mainly used
by voters in 14 states, according to the Brennan Center. Those states include
Georgia, and Pennsylvania — which are in play this year. Even large
regions of Ohio, Virginia, North Carolina and many other states still use them.
Among the brand names are Shouptronic,
AVC Advantage,
AccuVote OS,
Optech-III Eagle.

Most of these machines are over
10 years old, and the local authorities have no manuals for maintenance
and repair.

Claiming a lack of funds, state
legislatures have refused to replace them.

In 14 states, either computer
error or Appel-like reprogramming could distort results. Without a paper
trail, the only way to check the tally is through “initial” exit polling conducted
throughout the full span of voting hours and ending when the polls close.

Touchscreen machines were widely
used in Ohio in the 2004 Kerry-Bush election, the only one of 154 American
contests that year in which initial exit polling, which is ordinarily reliable,
was markedly out of sync with the officially announced total. Those who know
about computers have long been skeptical of this result.

As Appel has demonstrated, tt
takes no super-hacking skills to alter voting counts: “I did this in a secure
facility and I’m confident my program has not leaked out to affect real
elections, but really the software I built was not rocket science — any
computer programmer could write the same code. Once it’s installed, it could
steal elections without detection for years to come.”

But if computer experts can hack
every variety of touchscreen machine, what about foreign governments or
domestic organizations?

“Other computer scientists have
demonstrated similar hacks on many models of machine,” Appel added. “This is
not just one glitch in one manufacturer’s machine, it’s the very nature of
computers.”

In late July and early August,
columns by Hiawatha Bray in the Boston Globe, and Zeynep Tufekci of The
New York Times questioned for the first time whether voting in American
elections is secure from such hacking — with suspicion directed, though without
evidence, primarily at Russia. Suddenly, the disorganization and lack of
transparency of American vote counting had become a National Security Issue.

Weighing in on the issue,
President Barack Obama pointed out that most American elections are local or
state, done under diverse procedures and laws, and involving a large number of
voters. Even if particular computers, or a system of computers connected to the
Internet, could be hacked from the outside, it would be hard for a foreign or
domestic outlaw to falsify the results of a national election.

On the surface, this is a
heartening thought. But consider a close election like 2004. A targeted
hack — say, altering one candidate’s vote by an algorithm that kicks in as
precincts increase in size — might alter the outcome in certain key counties in
a swing state

In addition, voter registration
lists are centralized and kept on the Internet. During the Arizona and New York
primaries, many Democrats, often younger ones, reported that their registration
was changed without their knowledge. They were listed as a Republican or
Independent or with no year of registration indicated; as a result, they
couldn’t vote in their party’s primary.

This turned out to have been done
by election officials “by accident,” and perhaps also by hackers via Internet
access.

Bones to Pick with Bipartisan
Watchdogs

.

Now elections are watched over by
bipartisan committees in which Appel has some confidence. At least, he points
out, such supervision does not depend on a single powerful party or leader:

“When we elect our government
officials, sometimes we are voting for or against the very person or political
party who is in office right now, running that very election! How can we trust
that this person is running the election fairly? The answer is, we organize our
elections so we don’t have to trust any single person or party.

“That’s why, when you go to the
polls in most places, there are typically two poll-workers there, often (by
law) from different political parties; and there are poll-watchers,
representing the parties to make sure everything is done right. That’s why
recounts are done in the presence of witnesses from both parties. We run our
elections transparently so the parties can watch each other, and the result is
that even the losing candidate can trust that the election was run fairly. “

But there are two problems here.
So-called bipartisanship means that third parties, such as the Green Party and
the Libertarian Party, are by definition excluded.

In addition, many aspects of the
process end up in the hands of a single individual. Chief Clerk of Elections
Diane Haslett-Rudiano arbitrarily stripped 123,000 people from the Brooklyn
voter rolls in this year’s New York Democratic primary. She was later
fired by the Board of Elections — after
the.election was over.

Systemic Weak Points

.

But Appel is even more worried
about a systemic weak point in the electoral process.

“Voting machines are often
delivered to polling places several days before the election — to elementary
schools, churches, firehouses. In these locations anyone could gain access to a
voting machine for 10 minutes. Between elections the machines are routinely
opened up for maintenance by county employees or private contractors. Let’s
assume they have the utmost integrity, but still, in the US we try to run our
elections so that we can trust the election results without relying on any one
individual.”

An error occurred.

The only sure way to run a fair
election, Appel says, is to use and keep paper ballots. In 2009, Germany
adopted a system in which an initial exit poll is announced immediately after
voting closes — this determines a range of plausible results within a margin of
error — and then paper ballots are counted by hand. They have, since that time,
had no major controversies about electoral fairness.

Appel testified that newer,
optical screen voting machines can be equally secure if paper ballots are kept
and checked. Premier Optical Scan with Automark is used, in parts of
California, Colorado, and since 2008, under Secretary of State Jennifer
Brunner, in parts of Ohio. Often, these involve entering your vote, and leaving
a record, which you see in the machine, on a paper tape, of how your ballot was
cast.

But there are two striking
problems with even these somewhat better machines. First, in 2014, the
Environmental Protection Agency discovered that Volkswagens had an internal
computer program which had long passed US emission tests, but polluted forty
times more on the road. The cars were able to recognize when they were
being tested (and had to keep the emission controls switched on) and when they
were on the road and could pollute at will without fear of being caught. As
Barbara Simons of Verified Voting aptly put it, we do not want “VW-style
elections.”

Appel’s mantra is: “any computer
can be hacked.”

Separating paper ballots
physically from a computerized tape and keeping them in a different location,
many computer experts believe, would provide further insurance against hacking
even on optical scan machines.

Second, challenging the results,
particularly in a presidential election and even starting from an automatic
recount, as Al Gore did in Florida in 2000, is very difficult. It would take a
long time to recount the votes, even if the party in power were not trying to
sabotage it…

So the most important thing, as
in Germany, is to get each election right in the first place. Why, we might
ask, have officials sold public elections and the equal right to vote — again,
the most important public feature of our democracy — to private, profit-making
corporations? Once again, these corporations, claiming their programs are
“proprietary” secrets, do not allow any independent check of how they operate.

A few states like New Mexico have
adopted, Appel says, a model procedure for close or controversial elections:

*Immediately conduct a random
recount of part of the paper ballots.

*If there is an error, do a full
recount.

*Do not certify an election until
both are done.”

Appel and nine other experts,
including Lawrence Norden from the Democracy Program of the Brennan Center at
the New York University Law School and John McCarthy of the Verified Voting
Foundation, offered 10 suggestions for securing existing machines and
registration lists. For instance, they underline that “without voter-verified
paper ballots, effective audits are impossible; they recommend checking samples
from the voting system with hand counts of matched sets of paper ballots,
recruiting technical experts to help with such tests, and publicizing the
results, before certification of the election.

They also recommend a new,
detailed ballot accounting by each polling center and reconciliation with the
number of those who signed in to vote there. Still, to put these procedures
into practice would probably require sustained pressure from the voting public.

Moreover, anyone familiar with
vote counting in precincts across the country knows that many computer checking
and security measures these experts recommend are far too sophisticated for
most poll-watchers to implement before the November 8 election. Further, all
Secretaries of State, who are often unabashed political partisans, would have
to have good intentions — an assumption hard to reconcile with the actions of Kenneth
Blackwell in Ohio in 2004 or Katherine Harris
in Florida in 2000.

In contrast, consider the record
of Dana Debeauvoir, election clerk in Travis County which includes the
University of Texas (Austin). She has worked with critics and computer
experts, to propose a new type of encryption plus a paper record (it will not
be ready, unfortunately, until the 2020 election).

A federal law requiring oversight
of elections by politically independent or neutral state officials would vastly
improve the security of the American electoral process. But Appel is not
optimistic about the prospect of Congressionally mandated reforms. For
the upcoming election, some of the recommended measures will be in place in
some jurisdictions across the country.

After this election, however,
with a strong democratic push from below, it might be possible to outlaw the
highly insecure DREs (touch-screen machines), provide adequate funding
as well as training for election officials nationwide, and ensure an
independent paper trail on optical scan machines.

In fact, it might even be
possible to go to a paper ballot backed up by an initial exit poll. In contrast
to this November 8 — when, at best, only the large scale of the election makes
likely a trustworthy result — such reforms would ensure that our elections are,
both in appearance and in reality, fair.